# build unstable installer { description = "installation media"; inputs.nixos.url = "nixpkgs/nixos-unstable"; outputs = { self, nixos }: { nixosConfigurations = { exampleIso = nixos.lib.nixosSystem { system = "x86_64-linux"; modules = [ "${nixos}/nixos/modules/installer/cd-dvd/installation-cd-minimal-new-kernel-no-zfs.nix" ]; }; }; }; } git init git add flake.nix nix --extra-experimental-features flakes --extra-experimental-features nix-command build .#nixosConfigurations.exampleIso.config.system.build.isoImage sudo dd if=result/iso/nixos-24.05.20240108.317484b-x86_64-linux.iso of=/dev/sda bs=4M conv=fsync # good ZFS links https://openzfs.github.io/openzfs-docs/Getting%20Started/NixOS/Root%20on%20ZFS.html https://carjorvaz.com/posts/installing-nixos-with-root-on-tmpfs-and-encrypted-zfs-on-a-netcup-vps/ https://astrid.tech/2021/12/17/0/two-disk-encrypted-zfs/ https://mzhang.io/posts/2022-05-09-installing-nixos-on-encrypted-zfs/ # # enable ssh for root # sudo bash passwd # # kill old efi boot stuff # efibootmgr efibootmgr -b 0 -B efibootmgr -b 1 -B efibootmgr -b 2 -B efibootmgr -b 3 -B efibootmgr -b 4 -B efibootmgr # # install script below # # Defining some helper variables (these will be used in later code # blocks as well, so make sure to use the same terminal session or # redefine them later) DISK=/dev/disk/by-id/nvme-Seagate_FireCuda_530_ZP4000GM30013_7VS01VBM HOST=neko # ensure 4k sector size nvme format --lbaf=1 --force $DISK nvme id-ns -H $DISK sleep 5 # kill old data sgdisk --zap-all $DISK blkdiscard -v $DISK wipefs -a $DISK gdisk -l $DISK # create partitions parted $DISK -- mklabel gpt sgdisk -n 1:0:+1024M -c 1:"EFI System Partition" -t 1:EF00 $DISK sgdisk -n 2:0:0 -c 2:"Linux" -t 2:8e00 $DISK parted $DISK -- set 1 boot on sleep 5 # take a look cat /proc/partitions # boot partition mkfs.fat -F 32 -n EFIBOOT $DISK-part1 # create the crypto containers cryptsetup luksFormat --sector-size 4096 --batch-mode --verify-passphrase $DISK-part2 sleep 5 # open them, set right options persistently cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DISK-part2 crypt-system sleep 5 lsblk --fs # create btrfs with fast & strong checksumming and fast mounting mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-system sleep 5 btrfs filesystem show # create all the volumes mount /dev/mapper/crypt-system /mnt btrfs subvolume create /mnt/data btrfs subvolume create /mnt/nix btrfs subvolume create /mnt/root sleep 5 btrfs subvolume list /mnt # umount again, we will only use explicit subvolumes umount /mnt # prepare install mount -o subvol=root,noatime,nodiratime /dev/mapper/crypt-system /mnt # Create directories to mount file systems on mkdir -p /mnt/{data,nix,home,boot,root,etc/nixos} # mount the ESP mount $DISK-part1 /mnt/boot # mount volumes mount -o subvol=data,noatime,nodiratime /dev/mapper/crypt-system /mnt/data mount -o subvol=nix,noatime,nodiratime /dev/mapper/crypt-system /mnt/nix # bind mount persistent stuff to data mkdir -p /mnt/{data/home,data/root,data/nixos/$HOST} mount --bind /mnt/data/home /mnt/home mount --bind /mnt/data/root /mnt/root mount --bind /mnt/data/nixos/$HOST /mnt/etc/nixos # create fake /data to have the right paths mkdir -p /data mount --bind /mnt/data /data # take a look mount # configure nixos-generate-config --root /mnt # save /mnt/etc/nixos/hardware-configuration.nix /mnt/etc/nixos/configuration.nix cp /mnt/etc/nixos/hardware-configuration.nix /tmp cp /mnt/etc/nixos/configuration.nix /tmp # copy config data sudo scp -r /data/nixos root@192.168.13.171:/mnt/data # install nixos-install --option experimental-features 'nix-command flakes' --no-root-passwd --root /mnt # unmount all stuff umount -Rl /data /mnt cryptsetup luksClose crypt-system # sync all /data after the install sudo -E rsync -va --delete --one-file-system /data root@192.168.13.171:/ # get back the vms sudo -E rsync -va --delete --one-file-system /home/cullmann/vms/ root@192.168.13.171:/home/cullmann/vms/ # # after install tasks for extra file systems # # create vms disk DD=/dev/disk/by-id/nvme-CT2000P5PSSD8_213330E4ED05 sgdisk --zap-all $DD blkdiscard -v $DD wipefs -a $DD sleep 5 # create the crypto containers cryptsetup luksFormat --batch-mode --verify-passphrase $DD sleep 5 # open them, set right options persistently cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DD crypt-vms sleep 5 lsblk --fs # create btrfs with fast & strong checksumming and fast mounting mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-vms sleep 5 btrfs filesystem show # create projects disk DD=/dev/disk/by-id/nvme-Samsung_SSD_980_PRO_2TB_S69ENF0R846614L sgdisk --zap-all $DD blkdiscard -v $DD wipefs -a $DD sleep 5 # create the crypto containers cryptsetup luksFormat --batch-mode --verify-passphrase $DD sleep 5 # open them, set right options persistently cryptsetup luksOpen --allow-discards --perf-no_read_workqueue --perf-no_write_workqueue --persistent $DD crypt-projects sleep 5 lsblk --fs # create btrfs with fast & strong checksumming and fast mounting mkfs.btrfs -f --csum xxhash --features block-group-tree /dev/mapper/crypt-projects sleep 5 btrfs filesystem show